Westlands · West Park Towers · 8th floor
ISO 9001 procurement standards Authorised Cisco · Fortinet · Palo Alto · Dell EMC partner Twelve specialised practices · one operating discipline Direct vendor partnerships across infrastructure & security Engineering Kenya's public-sector infrastructure since 2018 ISO 9001 procurement standards Authorised Cisco · Fortinet · Palo Alto · Dell EMC partner Twelve specialised practices · one operating discipline Direct vendor partnerships across infrastructure & security Engineering Kenya's public-sector infrastructure since 2018
Nairobi · Est. 2018

Our Capabilities

Each practice is led by certified engineers and runs the same playbook: scoped design first, certified hands on the install, documented handover. Pricing, parts, and escalation come through direct vendor partnerships, not resellers.

Designed before deployed Installed by certified engineers Maintained past handover Direct vendor partnerships Designed before deployed Installed by certified engineers Maintained past handover Direct vendor partnerships
The frame

We deliver mandates, the kind that depend on the cabling holding up at 3am, the firewall holding under audit, the fibre lighting on the date written in the contract. Twelve practices, one accountable team.

Jump to a practice

Twelve practices

Structured Cabling
& Unified Communications.

The physical layer the whole network depends on, cabled by the same engineers who designed it.

Methodology

Every cabling mandate begins with a low-level design — pathways, containment, patch-panel layouts, distribution, IDF/MDF placement — drawn before the first reel is opened. Cat 6A and OS2 fibre installations follow ANSI/TIA standards and are certified at handover with calibrated testers (Fluke DSX or equivalent). For unified communications, voice and data converge on a single structured backbone.

What you receive

  • Low-level design (LLD)Pathway drawings, BoQ, patch schedules, labelling scheme
  • Certified installationCat 6A copper, OM4/OS2 fibre backbone, terminated and labelled
  • Test certificationFluke DSX printouts, length, NEXT, return loss for every link
  • UC stack integrationIP PBX, SIP trunking, handsets, softphone provisioning
  • As-built documentationFinal drawings, port maps, warranty registration with vendor
A neatly cabled network rack with patch panels and Cat 6A copper terminations
Patch Panel

Fibre Optic Solutions.

Long-haul, OSP, and last-mile fibre, spliced and lit on the date promised.

Methodology

Fibre routes are surveyed before they're trenched. Outside-plant work — direct burial, ducting, manholes, aerial — is planned around utility crossings, road reserves, and Way-leave permissions. Splicing is fusion-only (Fujikura or equivalent), with OTDR traces and end-to-end loss measurements documented per fibre.

What you receive

  • Route survey & designOSP route, BoQ, permits identified, splice point planning
  • OFC installationTrenching, ducting, blowing or pulling, aerial where required
  • Fusion splicingOTDR-traced, loss-budget verified, every fibre documented
  • Termination & commissioningSplice trays, ODFs, patch panels, light testing
  • Handover packOTDR traces, splice loss reports, route as-built drawings
Close-up of fibre-optic cables plugged into ports inside a server room
Fibre backbone

Radio & Antenna Networks.

Microwave links, point-to-point and point-to-multipoint, commissioned with line-of-sight verified.

Methodology

RF planning starts with a path profile — terrain, Fresnel zone, fade margin, link budget. Mast and tower selection accounts for wind loading and council requirements. Microwave dishes are aligned with link tools and commissioned only when receive signal sits within the design margin across diurnal variation. Where licensed bands are required, we coordinate with the Communications Authority of Kenya for frequency assignment.

What you receive

  • Link planPath profile, link budget, frequency selection, regulatory pathway
  • Tower & mountingMast or rooftop installation, grounding, lightning protection
  • Radio commissioningAlignment, RSSI logging, capacity verification
  • Antenna systemsSector and omni installations for BTS, Wi-Fi, IoT
  • Handover packLink test results, signal logs, regulatory licences
A telecommunications tower with multiple satellite dishes and antennas standing against the sky
Microwave link

Visualisation & Video Walls.

Control rooms and display systems for the institutions that need a wall full of trustworthy pixels.

Methodology

Video walls aren't just panels — they're a system: source matrix, processor, panels, mounts, content management, redundant power. We scope the operational use first (control room? lobby? NOC?), choose panels for ambient light and viewing distance, and design the content workflow so the wall does the job at 3am, not just at the demo.

What you receive

  • Operational designUse-case mapping, source planning, content workflow
  • Hardware & mountingPanels, video processor, structural mount, cable management
  • Content & controlCMS setup, source switching, layout templates
  • Operator trainingRun-book, fault recovery, content updates
  • Spares & supportCritical spares held in-country, response SLAs
A modern control room with operators at workstations monitoring a wall of large digital displays
Control room

CCTV & Access Control.

IP-based surveillance and biometric access, designed as a system, not a camera count.

Methodology

A CCTV deployment that works is a deployment that's been thought through: camera placement against threat model, lighting and lens choice for the actual scene, retention against legal and operational need, network segregation from production traffic. Access control follows the same logic — door schedule mapping, reader placement, biometric vs card vs combined, integration with HR systems for joiner-mover-leaver flows.

What you receive

  • Threat & coverage mapCamera placement, sightlines, blind-spot analysis
  • NVR & storageRetention sized to legal and operational need, RAID protection
  • Network segregationVLAN isolation, dedicated PoE switching, restricted access
  • Access control systemReaders, controllers, door hardware, system administration
  • Operator handoverConsole training, retention review, response procedures
Bullet IP camera mounted to a building exterior
White bullet camera

Precision Environment.

Cooling and humidity control for the rooms that get hot when they shouldn't.

Methodology

Server-room cooling is a thermodynamics problem before it's a procurement problem. We size CRAC and in-row units against actual heat load — not nameplate ratings — accounting for redundancy (N+1 minimum for production), hot/cold aisle containment, and humidity range. Where existing rooms are upgrading, we run a thermal survey before specifying anything.

What you receive

  • Thermal surveyHeat load measurement, hot-spot mapping, airflow analysis
  • Cooling designCRAC or in-row sizing, redundancy strategy, containment plan
  • InstallationUnits, condensers, refrigerant lines, condensate, electrical
  • CommissioningPerformance verification across full load and failover scenarios
  • Service contractQuarterly servicing, filter changes, response SLA on faults
A neatly cabled network rack with patch panels and Cat 6A copper terminations
Server-room hallway with overhead climate infrastructure

Data Storage Infrastructure.

SAN, NAS, object sized for institutional data growth, not vendor sales targets.

Methodology

Storage decisions look simple in a brochure and complex in production. We scope against actual workload IOPS, growth trajectory, RPO/RTO requirements, and replication strategy not just raw capacity. Block, file, and object storage chosen for the actual access pattern. Tiered storage planning where hot, warm, and cold data justify different media. Backup and disaster recovery sized as part of the solution, not bolted on after.

What you receive

  • Workload analysisIOPS profile, growth model, RPO/RTO requirements
  • Storage architectureSAN/NAS/object selection, tiering, replication design
  • Installation & migrationHardware install, data migration with parallel-run validation
  • Backup integrationBackup software, retention policy, recovery testing
  • Monitoring & alertsCapacity trending, performance baselines, alert thresholds
A modern server rack with network equipment lit in blue — enterprise data storage infrastructure
Storage array

Network & Data Security.

Firewalls, segmentation, and zero-trust posture deployed by engineers who'll still be on the phone at 3am.

Methodology

Security architecture starts from threat modelling, not product selection. We map the assets, the actors, and the paths between them, then design controls at the right layers — perimeter NGFW, internal segmentation, identity-aware access, endpoint detection. Zero-trust principles applied where they earn their complexity, not because the marketing demands it. Configuration is hardened against vendor-published baselines (CIS, vendor STIGs) and reviewed before promotion to production.

What you receive

  • Threat & asset modelAsset register, trust zones, attack-path analysis
  • Architecture & controlsNGFW, segmentation, IPS/IDS, WAF, identity integration
  • Hardened configurationReviewed against CIS / vendor baselines, change-controlled
  • SOC integrationLog forwarding, SIEM rules, alert tuning where you operate one
  • Operational runbookIncident response procedures, escalation tree, recovery playbooks
Red and blue fibre-optic cable bokeh in a darkened communications cabinet
Network & Data Security.

Data Centre Planning & Design.

From floorplate to live workload, data centres designed before they're built.

Methodology

A data centre is the integration of seven systems — power, cooling, fire, access, network, structured cabling, monitoring — and either they fit together or they fight each other. We design against a target tier (typically Tier III for institutional work), with redundancy strategies that match the operational mandate. BCDR planning runs in parallel: the secondary site, the replication path, the runbook. DCIM tooling chosen to give operators visibility from day one.

What you receive

  • Concept & tier designTopology, redundancy strategy, capacity roadmap
  • Detailed engineeringFloor plan, power schematic, cooling design, cable pathways
  • Build managementVendor coordination, milestone tracking, commissioning oversight
  • BCDR planSecondary site design, replication, recovery procedures
  • DCIMAsset register, capacity dashboards, environmental monitoring
A neatly cabled network rack with patch panels and Cat 6A copper terminations
Data Centre Planning & Design.

Power & UPS systems.

Conditioning, backup, and PDU work — because power problems take everything down at once.

Methodology

Power design starts with the load profile and the failure mode you're protecting against. UPS sizing accounts for actual draw, runtime requirement, recharge time, and battery chemistry choice (VRLA vs lithium-ion). Switchgear and PDUs sized for redundancy strategy — A/B feeds, automatic transfer, by-pass for maintenance. Earthing and surge protection treated as part of the system, not a checkbox. Installation coordinated with utility (KPLC) and any generator infrastructure already on site.

What you receive

  • Load survey & designCurrent draw measurement, growth headroom, redundancy plan
  • UPS specificationSizing, runtime, battery selection, monitoring integration
  • Switchgear & PDUDistribution design, A/B feeds, ATS, maintenance bypass
  • Surge & earthingLightning protection, surge arrestors, equipotential bonding
  • Service contractBattery replacement schedule, annual load test, response SLA
A neatly cabled network rack with patch panels and Cat 6A copper terminations
UNINTERRUPTED POWER SUPPLIES

ICT Products & Supply.

Procurement and managed migrations at authorised-partner pricing, with parts and escalation included.

Methodology

Direct vendor relationships compound: pricing, lead times, parts availability, and escalation channels all improve when the firm in front of the vendor isn't a reseller-of-resellers. We supply against scoped requirements (not catalogues), with configuration and asset registration handled before delivery. For migration mandates — operating system upgrades, virtualisation, M365 transitions — we plan the rollback path before starting, run pilots before broad deployment, and document the steady-state before signing off.

What you receive

  • Scoped procurementRequirements-driven specification, vendor quotes, comparison matrix
  • Configuration & stagingPre-deployment configuration, asset registration, warranty
  • Migration planningPilot, phased rollout, rollback plan, user comms
  • Hand-over & trainingEnd-user training, IT-team training, run-book
  • Lifecycle managementWarranty register, refresh planning, end-of-life disposition
Scoped procurement

Strategic Consultancy.

Vendor-agnostic advisory, PMO, and lifecycle planning when you need a second opinion from people with hands on the kit.

Methodology

Most consultancy in the ICT space is performed by people who haven't run cable in a decade — or ever. Our consultancy engagements are led by engineers who do the work, on the same kit, every week. That gives us a different kind of opinion: grounded in actual deployment realities, not slide-deck abstractions. We do tender support, vendor selection reviews, refresh planning, second-opinion assessments, and long-form lifecycle roadmaps — vendor-agnostic, written for the institution that has to live with the decision.

What you receive

  • Tender response supportBid review, technical input, compliance matrix
  • Vendor selection reviewsComparison matrix, shortlist support, due diligence
  • Refresh & lifecycle planningMulti-year roadmap, capex projection, phasing
  • Second opinionsIndependent review of design, scope, or proposal
  • PMO supportProgramme management for multi-vendor delivery, status reporting
A senior engineer in a working data-centre setting, reflective of a hands-on consultant
Independent advisor

The discipline behind every practice.

Standards · partnerships · accountability
Quality
ISO 9001 aligned
Procurement and delivery follow documented quality-management procedures across every mandate.
Vendor authority
Authorised partner
Cisco · Fortinet · Palo Alto · Dell EMC · VMware · Microsoft · Huawei · Check Point.
References
Available on request
Contactable references across National Treasury, KALRO, MoE programmes, and the Judiciary.
Accountability
Insurance & performance bonds
Project insurance and performance bonds available to match tender requirements.

Have a project
that has to land?
Brief us.

Tell us about the mandate; the scope, the timeline, the constraints. A senior engineer will respond with a real conversation, not a sales pitch.

Or email info@techsource.co.ke
Brief our engineers
Step 1 of 4

What's the mandate?

Pick the closest description. You can clarify in the next step.

How big?

A rough idea is fine — we'll scope properly during the brief.

When do you need it?

If you're exploratory, that's fine — we'll send you our credentials pack instead.

How can a senior engineer reach you?

A senior engineer will respond within one business day.